Date


School

Output Type

Download Available

38 results

Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks

Presentation / Conference
Ali, A. E., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2018, June)
Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks. Paper presented at The 16th IEEE International Conference on Smart City (IEEE SmartCity-2018), Exeter, UK
In Wireless Sensor Networks, clustering sensor nodes into disjoint groups is widely used to achieve load balance and increase network lifetime. In particular, traditional uneq...

Blockchain and Git repositories for sticky policies protected OOXML.

Presentation / Conference
Spyra, G., Buchanan, W. J. & Ekonomou, E. (2017, November)
Blockchain and Git repositories for sticky policies protected OOXML. Presented at FTC 2017 - Future Technologies Conference 2017, Vancouver, Canada
The paper discuss possible cloud-based Information Rights Management (IRM) model extension with enhanced accountability for both a sticky policy and an attached data. This wor...

5G as an enabler for Medical IOT - 5GMIOT

Presentation / Conference
Thuemmler, C., & Jefefries, N. (2016, December)
5G as an enabler for Medical IOT - 5GMIOT. Presented at IEEE Globecom 2016
Short Power Point presentation on 5G as enabler for Medical IoT – 5GMIOT Standards, policies and strategies for social technological alignment of 5G technology

A decentralized group key management protocol for mobile Internet of things (DBGK)

Presentation / Conference
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2015, August)
A decentralized group key management protocol for mobile Internet of things (DBGK). Paper presented at The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15

Assessing the available and accessible evidence: how personal reputations are determined and managed online.

Presentation / Conference
Ryan, F., Cruickshank, P., Hall, H., & Lawson, A. (2015, June)
Assessing the available and accessible evidence: how personal reputations are determined and managed online. Paper presented at Information: interactions and impact (i3) 2015
This paper is concerned with how online information contributes to the determination of personal reputations. The term “personal reputation” in this context means the reputati...

Could social networking online help NEET young people gain employment?

Presentation / Conference
Mowbray, J., Hall, H. & Raeside, R. (2015, June)
Could social networking online help NEET young people gain employment?. Paper presented at Information: interactions and impact (i3) 2015, Robert Gordon University, Aberdeen, Scotland
This paper first explores the literature pertaining to social networking in both off-line and online environments, and places it within the context of the study of employment ...

Teaching penetration and malware analysis in a cloud-based environment.

Presentation / Conference
Buchanan, W. J., Ramsay, B., Macfarlane, R., Smales, A., & Russell, G. (2015, June)
Teaching penetration and malware analysis in a cloud-based environment. Paper presented at UK Workshop on Cybersecurity Training & Education, Liverpool
This paper outlines evaluation of running a private Cloud-based system over two semesters at Edinburgh Napier University for two modules: Security Testing and Advanced Network...

Mobile User Authentication System for E-commerce Applications.

Presentation / Conference
Molla, R., Romdhani, I., Buchanan, W. J., & Fadel, E. Y. (2014, June)
Mobile User Authentication System for E-commerce Applications. Paper presented at International Conference on Advanced Networking, Distributed Systems and Applications 2014, Bejaia, Algeria
E-commerce applications provide on-line clients and merchants with a quick and convenient way to exchange goods and services. However, the deployment of these applications is ...

Learning to Cope with Digital Technology

Presentation / Conference
Sobolewska, E. (2014, May)
Learning to Cope with Digital Technology. Poster presented at FECCE, Postgraduate Research Conference 2014, Edinburgh
There is a widespread assumption, that everyone uses modern interactive technology and appreciates its liberating effects. However, according to recent reports, ten million pe...

The Risks and Opportunities of Mobile Working within Cloud Environments.

Presentation / Conference
Buchanan, W. J., & Smales, A. (2014, February)
The Risks and Opportunities of Mobile Working within Cloud Environments. Paper presented at Practical Perspectives on Secure Mobile Working, Edinburgh
This presentation outlines the changing architecture of business systems, and with the increasing use of Cloud-based systems. It outlines some of the key risks around using mo...